In a daring exploit showcasing just how much hackers really care about your cybersecurity needs, unidentified threat actors took it upon themselves to lovingly sprinkle some keyloggers onto over 70 Microsoft Exchange servers. Because what’s a login page without a bit of malicious JavaScript, right?
According to a study by Positive Technologies, this newfound affection for Microsoft Exchange has led to the deployment of not one, but two different types of keyloggers! Yes, you heard that right — it’s a buy-one-get-one-free offer. While one keylogger persists in saving your credentials onto a local file, the second one ensures it’s not left out of the action by having absolutely no discernible impact whatsoever. Teamwork makes the dream work!
Meanwhile, Microsoft has issued its official response by showcasing its beloved tradition of ‘thoughts and prayers’ for all affected businesses. But don’t worry, they’re working on a patch right after they finish binge-watching their favorite tech disaster documentaries.
Leave a Reply